Which of the following metrics confirms there is a cabling issue?

A network technician is reviewing the interface counters on a router interface. The technician is attempting to confirm a cable issue. Given the following information: Which of the following metrics confirms there is a cabling issue?A . Last cleared B. Number of packets output C. CRCs D. Giants E. MulticastsView...

August 19, 2023 No Comments READ MORE +

Which of the following describes the issue?

A branch of a company recently switched to a new ISP. The network engineer was given a new IP range to assign. The ISP assigned 196.26.4.0/26, and the branch gateway router now has the following configurations on the interface that peers to the ISP: The network engineer observes that all...

August 19, 2023 No Comments READ MORE +

Which of the following is the MOST likely cause of the issue?

A technician is installing a new fiber connection to a network device in a datacenter. The connection from the device to the switch also traverses a patch panel connection. The chain of connections is in the following order: Device LC/LC patch cable Patch panel Cross-connect fiber cable Patch panel LC/LC...

August 19, 2023 No Comments READ MORE +

Which of the following metrics will MOST accurately show the underlying performance issues?

A client recently added 100 users who are using VMs. All users have since reported slow or unresponsive desktops. Reports show minimal network congestion, zero packet loss, and acceptable packet delay. Which of the following metrics will MOST accurately show the underlying performance issues? (Choose two.)A . CPU usage B....

August 19, 2023 No Comments READ MORE +

Which of the following is MOST likely to generate significant East-West traffic in a datacenter?

Which of the following is MOST likely to generate significant East-West traffic in a datacenter?A . A backup of a large video presentation to cloud storage for archival purposes B. A duplication of a hosted virtual server to another physical server for redundancy C. A download of navigation data to...

August 19, 2023 No Comments READ MORE +

Which of the following would be BEST to use to detect a MAC spoofing attack?

Which of the following would be BEST to use to detect a MAC spoofing attack?A . Internet Control Message Protocol B. Reverse Address Resolution Protocol C. Dynamic Host Configuration Protocol D. Internet Message Access ProtocolView AnswerAnswer: B Explanation: Reverse Address Resolution Protocol (RARP) is a protocol that allows a device...

August 19, 2023 No Comments READ MORE +

According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue?

According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue?A . Establish a plan of action to resolve the issue and identify potential effects B. Verify full system functionality and, if applicable, implement preventive measures C. Implement...

August 18, 2023 No Comments READ MORE +

Which of the following routing protocols is used to exchange route information between public autonomous systems?

Which of the following routing protocols is used to exchange route information between public autonomous systems?A . OSPF B. BGP C. EGRIP D. RIPView AnswerAnswer: B Explanation: BGP (Border Gateway Protocol) is a routing protocol used to exchange route information between public autonomous systems (AS). OSPF (Open Shortest Path First),...

August 18, 2023 No Comments READ MORE +

Which of the following tools should an engineer use to detect the exact break point of the fiber link?

A fiber link connecting two campus networks is broken. Which of the following tools should an engineer use to detect the exact break point of the fiber link?A . OTDR B. Tone generator C. Fusion splicer D. Cable tester E. PoE injectorView AnswerAnswer: A Explanation: To detect the exact break...

August 18, 2023 No Comments READ MORE +

Which of the following policies should the network administrator implements to BEST mitigate this issue?

The network administrator is informed that a user’s email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)A . Captive portal B. Two-factor authentication C. Complex passwords D. Geofencing E. Role-based access F. Explicit denyView...

August 18, 2023 No Comments READ MORE +